Fig. 4From: Similarity testing for role-based access control systemsExample of FSM(P) specifying an RBAC policyBack to article page